I own an old 'coffee pot' with a Celeron and 4 gigs of ram that I added after getting my box.
This is a very SUBJECTIVE matter, take it with "grain of salt".
After the installation, and playing around with XFCE, I update/upgrade, I installed my favorite apps: qterminal, xfe, mirage, scrot, unclutter,numlockx, gpm, icewm, menumaker, jwm, gmrun.
I like my apps maximized, launched with keybindings, I am an old man, and refuse to point and click and waste time with such nonsense.
I configure sudo with visudo or with my favorite editor ee, by editing /usr/local/etc/sudoers and uncomenting the wheel line no passwd.
Code: Select all
## Same thing without a password
%wheel ALL=(ALL) NOPASSWD: ALL
So, I don't have to write my password.
Next, I edit as ROOT, my .xinitrc so I can launch IceWM or JWM and leave it looking like this:
Code: Select all
# ee /home/username/.xinitrc
And leave it looking like this:
Code: Select all
#!/bin/sh
setxkbmap -model pc105 -layout es, ISO-8859-15-acc
setxkbmap -option terminate:ctrl_alt_bksp
xsetroot -solid black
unclutter -idle 2 &
numlockx &
exec icewm
Then I shorten the time for the automatic boot, down to 4 seconds instead of 10, by editing the file as ROOT, /boot/defaults/loader.conf, uncomenting this line, putting the amount of seconds you want, and leaving it like this:
Code: Select all
autoboot_delay="4"
As ROOT, I paste this in /etc/pf.conf .
Code: Select all
block in all
pass out all keep state
Code: Select all
pf_enable="YES"
pf_rules="/etc/pf.conf"
pf_flags=""
pflog_enable="YES"
pflog_logfile="/var/log/pflog"
pflog_flags=""
When I come back, I check it with http://www.grc.com and got this:
"Your system has achieved a perfect "TruStealth" rating. Not a single packet — solicited or otherwise — was received from your system as a result of our security probing tests. Your system ignored and refused to reply to repeated Pings (ICMP Echo Requests). From the standpoint of the passing probes of any hacker, this machine does not exist on the Internet. Some questionable personal security systems expose their users by attempting to "counter-probe the prober", thus revealing themselves. But your system wisely remained silent in every way. Very nice."
Note: to use grc.com, click on ShieldsUp > ShieldsUp again (under Hot Spots) > Proceed > All Service Ports > Wait till it checks the ports, if they are all neon-green, you are fine, Stealth (invisible)
Then I configure IceWM and Bob's your uncle!
Hope this helps somebody. Happy trails...